Login / Signup
Traitor Tracing Revisited: New Attackers, Stronger Security Model and New Construction.
Xu An Wang
Lunhai Pan
Hao Liu
Xiaoyuan Yang
Published in:
IACR Cryptol. ePrint Arch. (2023)
Keyphrases
</>
security model
access control
public key
security analysis
security requirements
security architecture
provably secure
designated verifier
public key cryptography
data mining